AI, Racial Profiling Put Credibility at Risk

AI, Racial Profiling Put Credibility at Risk

A news report states Hikvision has covered up evidence of racial profiling and Artificial Intelligence errors

A news report led by the U.S. government-funded Voice of America (VOA) states that Hikvision has covered up evidence of racial profiling and Artificial Intelligence errors.

VOA published a report “Technology company Hikvision sees new technology to identify minorities in surveillance video,” on June 16. They also cited a report from the IPVM blog, “Hikvision’s Minority Analytics” report, which was published on May 8, in which IPVM blogger John Honovich revealed that Hikvision, is conducting racial profiling as well as basic errors in their AI system.

VOA is among several international publications to confirm IPVM’s reporting, and are raising concerns about what the Chinese government-controlled video surveillance firm is doing.

A publicity video recently published by one of China's largest video surveillance system suppliers shows that the company’s analysis system has a “minorities” identification project. Some industry media are concerned that this technology will infringe on the rights and interests of ethnic minorities.

According to IPVM, a security monitoring system and video surveillance evaluation website, Hikvision demonstrated the technology at its "Chi Yong Qian Tang AI Cloud" summit.

The information was picked up by China Times Digital, a prominent site critical to the PRC government. IPVM went as far to cite case videos from the 2018 AI Cloud Eco-International Summit website but the part of the recognition of “ethnic minorities” has disappeared from the video, but the Internet being what it is, the original video had been captured, which states that cameras are able to “track specific visitors to monitor and track their position and last appearance….”

An email request for comment was sent to Hikvision’s America’s media staff, without a response as to why the video cover up or why or if they were conducting minority analytics. An email was sent to the corporate media representative, who declined comment.

Censorship is routine with the Chinese government, which covers up information harmful to the China Communist Party. Recently, HBO’s website was banned inside of China when a comedian criticized China’s “Supreme Leader.” It is no surprise that the government could be covering up racial profiling and failure of the much-hyped AI program.

According to IPVM comments, Hikvision seems to have trouble with honesty with its “overseas” Western market, which is no laughing matter. According to Honovich, the company is regularly deceptive about its Chinese government ownership, and he said they ran a false advertising campaign for their AI solution, and misled consumers about their backdoor. “Only a week ago they corrected a false cybersecurity announcement,” Honovich said.

“Hikvision has a difficult challenge,” Honovich said. “On the one hand, Hikvision generates 70 percent of their business inside of China, dependent on being owned and controlled by the Chinese government. On the other hand, Hikvision wants to be a trusted security solutions provider for Western democracies. It simply may not be possible to achieve the latter, given the former.”

VOA interviewed Stephen Bryen, a widely published expert on international affairs and cyber security, wrote an article outlining his concerns about the purchase, saying the Hikvision cameras were never proven to be any more secure than comparable models.

“If the procurement officer actually thought these cameras were more secure than others, that would have been claimed as part of the sole-source justification,” he said of the embassy purchase agreement, adding that no claims of any kind were made regarding the Hikvision products.

“The issue is that the U.S. embassy is installing commercial cameras in one if its most sensitive locations,” Bryen wrote. “This is a big mistake, and mistakes like this can cost lives.”

In the United States alone, the company's surveillance systems can be found everywhere from prisons to airports to private homes and public schools, and even in places with sensitive national security concerns, such as Fort Leonard Wood military base in Missouri. Abroad, its cameras were installed in the U.S. embassy in Kabul, Afghanistan. Hikvision security solutions have since been removed from both locations, and the U.S. House has passed a bill, pending Senate approval, that that would bar government use of Chinese-made video surveillance equipment. This proposed law is pending action in the Senate.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3